Cryptographic Security Through a Hardware Root of Trust.
Luis F. Rojas-MuñozSantiago Sánchez-SolanoMacarena C. Martínez-RodríguezEros Camacho-RuizPablo Navarro-TorreroApurba KarmakarCarlos Fernández GarcíaErica Tena-SánchezFrancisco Eugenio Potestad-OrdóñezAlejandro Casado-GalánPau Ortega-CastroAntonio Acosta-JiménezCarlos Jesús Jiménez-FernándezPiedad BroxPublished in: ARC (2024)
Keyphrases
- random number generator
- trusted computing
- security protocols
- security services
- key management
- protection schemes
- smart card
- security properties
- public key infrastructure
- random number
- encryption scheme
- advanced encryption standard
- low cost
- public key cryptography
- information security
- cryptographic protocols
- access control
- real time
- trust management
- security requirements
- computer security
- trust model
- intrusion detection
- trust relationships
- secure communication
- cryptographic algorithms
- security analysis
- computing platform
- encryption key
- trust negotiation
- digital signature
- hardware and software
- hardware implementation
- security policies
- stream cipher
- security issues
- encryption decryption
- computer systems
- cloud computing
- privacy protection
- hash functions
- high assurance
- policy enforcement
- public key encryption
- data integrity
- security mechanisms
- statistical databases
- computing systems
- data encryption
- elliptic curve cryptography
- security model
- privacy concerns
- fuzzy vault
- network security
- computing environments